Some typos fixed.
authorTobias Brunner <tobias@strongswan.org>
Mon, 7 Feb 2011 10:13:27 +0000 (11:13 +0100)
committerTobias Brunner <tobias@strongswan.org>
Mon, 7 Feb 2011 10:39:41 +0000 (11:39 +0100)
13 files changed:
man/ipsec.conf.5.in
src/conftest/conftest.c
src/conftest/hooks/unsort_message.c
src/libcharon/encoding/payloads/payload.h
src/libcharon/sa/tasks/child_create.c
src/libstrongswan/eap/eap.h
src/libstrongswan/plugins/x509/x509_cert.c
src/libtls/tls.h
src/pluto/ca.c
src/pluto/demux.c
src/scepclient/scepclient.8
testing/tests/ikev1/xauth-rsa-fail/description.txt
testing/tests/ikev1/xauth-rsa-nosecret/description.txt

index 48eb136..9a789ac 100644 (file)
@@ -594,7 +594,7 @@ sets
 to the distinguished name of the certificate's subject and
 .B leftca
 to the distinguished name of the certificate's issuer.
-The left participant's ID can be overriden by specifying a
+The left participant's ID can be overridden by specifying a
 .B leftid
 value which must be certified by the certificate, though.
 .TP
index 646359a..fea8881 100644 (file)
@@ -196,7 +196,7 @@ static bool load_keys(settings_t *settings, char *dir)
                }
                else
                {
-                       fprintf(stderr, "unkown key type: '%s'\n", type);
+                       fprintf(stderr, "unknown key type: '%s'\n", type);
                        enumerator->destroy(enumerator);
                        return FALSE;
                }
index 9af13e8..b37b261 100644 (file)
@@ -85,7 +85,7 @@ METHOD(listener_t, message, bool,
                        }
                        else
                        {
-                               DBG1(DBG_CFG, "unkown payload to sort: '%s', skipped", name);
+                               DBG1(DBG_CFG, "unknown payload to sort: '%s', skipped", name);
                        }
                }
                order->destroy(order);
index 9d5ba8f..0f407ff 100644 (file)
@@ -261,10 +261,10 @@ struct payload_t {
 payload_t *payload_create(payload_type_t type);
 
 /**
- * Check if a specific payload is implemented, or handled as unkown payload.
+ * Check if a specific payload is implemented, or handled as unknown payload.
  *
  * @param type         type of the payload to check
- * @return                     FALSE if payload type handled as unkown payload
+ * @return                     FALSE if payload type handled as unknown payload
  */
 bool payload_is_known(payload_type_t type);
 
index 02831b0..fc02a33 100644 (file)
@@ -967,7 +967,7 @@ METHOD(task_t, build_r, status_t,
                                case INTERNAL_ADDRESS_FAILURE:
                                case FAILED_CP_REQUIRED:
                                {
-                                       DBG1(DBG_IKE,"configuration payload negotation "
+                                       DBG1(DBG_IKE,"configuration payload negotiation "
                                                 "failed, no CHILD_SA built");
                                        enumerator->destroy(enumerator);
                                        handle_child_sa_failure(this, message);
index 1d55747..e98a3a2 100644 (file)
@@ -82,7 +82,7 @@ extern enum_name_t *eap_type_short_names;
  * Lookup the EAP method type from a string.
  *
  * @param name         EAP method name (such as "md5", "aka")
- * @return                     method type, 0 if unkown
+ * @return                     method type, 0 if unknown
  */
 eap_type_t eap_type_from_string(char *name);
 
index d4fb4e0..c3bb4ea 100644 (file)
@@ -648,7 +648,7 @@ static void parse_authorityInfoAccess(chunk_t blob, int level0,
                                                }
                                                break;
                                        default:
-                                               /* unkown accessMethod, ignoring */
+                                               /* unknown accessMethod, ignoring */
                                                break;
                                }
                                break;
index 1908f5d..e2c377a 100644 (file)
@@ -202,7 +202,7 @@ struct tls_t {
        /**
         * Check if TLS negotiation completed successfully.
         *
-        * @return                      TRUE if TLS negotation and authentication complete
+        * @return                      TRUE if TLS negotiation and authentication complete
         */
        bool (*is_complete)(tls_t *this);
 
index 2654774..add85de 100644 (file)
@@ -629,7 +629,7 @@ void add_ca_info(const whack_message_t *msg)
                        if (strncasecmp(msg->ocspuri, "http", 4) == 0)
                                ca->ocspuri = clone_str(msg->ocspuri);
                        else
-                               plog("  ignoring ocspuri with unkown protocol");
+                               plog("  ignoring ocspuri with unknown protocol");
                }
 
                /* add crl uris */
index 0590a35..249e645 100644 (file)
@@ -1147,7 +1147,7 @@ read_packet(struct msg_digest *md)
        }
        else if (from_ugh != NULL)
        {
-               plog("recvfrom on %s returned misformed source sockaddr: %s"
+               plog("recvfrom on %s returned malformed source sockaddr: %s"
                        , ifp->rname, from_ugh);
                return FALSE;
        }
index 4b5234d..72750e1 100644 (file)
@@ -239,12 +239,12 @@ Log raw hex dumps.
 .PP 
 .B \-C, \-\-debug\-control
 .RS 4
-Log informations about control flow.
+Log information about control flow.
 .RE
 .PP 
 .B \-M, \-\-debug\-controlmore
 .RS 4
-Log more detailed informations about control flow.
+Log more detailed information about control flow.
 .RE
 .PP 
 .B \-X, \-\-debug\-private
index 83e9d27..98d85f3 100644 (file)
@@ -2,4 +2,4 @@ The roadwarrior <b>carol</b> sets up a connection to gateway <b>moon</b>.
 The authentication is based on RSA signatures (<b>RSASIG</b>) using X.509
 certificates followed by extended authentication (<b>XAUTH</b>) based
 on user name and password. Because user <b>carol</b> presents a wrong
-XAUTH password the IKE negotation is aborted and the ISAKMP SA is deleted.
+XAUTH password the IKE negotiation is aborted and the ISAKMP SA is deleted.
index ffbb47c..a6fe823 100644 (file)
@@ -2,5 +2,5 @@ The roadwarrior <b>carol</b> sets up a connection to gateway <b>moon</b>.
 The authentication is based on RSA signatures (<b>RSASIG</b>) using X.509
 certificates followed by extended authentication (<b>XAUTH</b>) based
 on user name and password. Because user <b>carol</b> cannot find her 
-XAUTH credentials in ipsec.secrets, the IKE negotation is aborted and the
+XAUTH credentials in ipsec.secrets, the IKE negotiation is aborted and the
 ISAKMP SA is deleted.